microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
History

Sun, 22 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
Title microASP Portal+ CMS SQL Injection via pagina.phtml
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-22T13:43:49.812Z

Reserved: 2026-02-15T12:45:19.065Z

Link: CVE-2019-25366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-22T14:15:59.433

Modified: 2026-02-22T14:15:59.433

Link: CVE-2019-25366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.